Preventing Widespread Automated Attacks in iOS – Part 2